Money Moves: March 2020
Palo Alto paid $420M for CloudGenix; Microsoft acquired Affirmed; AWS pledged $20 million to...
Palo Alto paid $420M for CloudGenix; Microsoft acquired Affirmed; AWS pledged $20 million to...

Although March has come and gone, you can still take part in the awesome activities put together by the community to celebrate Docker’s 7th birthday.
Denise Rey and Captains Łukasz Lach, Marcos Nils, Elton Stoneman, Nicholas Dille, and Brandon Mitchell put together an amazing birthday challenge for the community to complete and it is still available. If you haven’t checked out the hands-on learning content yet, go to the birthday page and earn your seven badges (and don’t forget to share them on twitter).
Captain Bret Fisher hosted a 3-hour live Birthday Show with the Docker team and Captains. You can check out the whole thing on Docker’s Youtube Channel, or skip ahead using the timestamps below:

And while many Community Leaders had to cancel in-person meetups due to the evolving COVID 19 situation, they and their communities still showed up and shared their #mydockerbday stories. There Continue reading
“In the next three years economic forces will drive operators to go to open RAN," said Altiostar...

The recommendation for social distancing to slow down the spread of COVID-19 has led many companies to adopt a work-from-home policy for their employees in offices around the world, and Cloudflare is no exception.
As a result, a large portion of Internet access shifted from office-focused areas, like city centers and business parks, towards more residential areas like suburbs and outlying towns. We wanted to find out just precisely how broad this geographical traffic migration was, and how different locations were affected by it.
It turns out it is substantial, and the results are quite stunning:
So how can we determine if Internet usage patterns have changed from a geographical perspective?
In each Cloudflare Point of Presence (in more than 200 cities worldwide) there's an edge router whose responsibility it is to switch Internet traffic to serve the requests of end users in the region.
These edge routers are the network's entry point and for monitoring and debugging purposes each router samples IP packet information regarding the traffic that traverses them. This data is collected as flow records and contains layer-3 related information, such as the source and destination IP address, port, packet size etc.
These statistical Continue reading
Another post in my burst of amateur radio blog posts.
To say that the documentation for APRS is not great is an understatement. What should be the best source of information, aprs.org, is just a collection of angry rants by the inventor of APRS, angrily accusing implementations and operators of using his invention the wrong way. There’s no documentation about what the right way is, just that everyone is wrong.
So here I’ll attempt to write down what it is, in one place, in an effort to both teach others, and for people who know more than me to correct me.
The best source of APRS information for me has actually been Kenwood radio manuals. See resources at the bottom.
APRS is a way to send short pieces of digital information as packets of data. The messages are:
As an operator you Continue reading
As I mentioned in this post on region and endpoint match in AWS API requests, exploring the AWS APIs is something I’ve been doing off and on for several months. There’s a couple reasons for this; I’ll go into those in a bit more detail shortly. In any case, I’ve been exploring the APIs using Postman (when on Linux) and Paw (when on macOS), and in this post I’ll share how to use Postman to launch an EC2 instance via API calls.
Before I get into the technical details, let me lay out a couple reasons for spending some time on this. I’m pretty familiar with tools like Terraform and Pulumi (my current favorite), and I’m reasonably familiar with AWS CLI itself. In looking at working directly with the APIs, I see this as adding a new perspective on how these other tools work. (I’ve found, in fact, that exploring the APIs has improved my usage of the AWS CLI.) Finally, as I try to deepen my knowledge of programming languages, I wanted to have a reasonable knowledge of the APIs before trying to program around the APIs (hopefully this will make the learning curve a bit less Continue reading
Cisco pledged to preserve jobs; AWS added direct storage to ECS, Fargate; and SAP prepped for...
Since late February and early March, when the coronavirus outbreak began to spill out of China in earnest and spread its sickness and death across Europe, throughout the United States, and into other parts of the globe, IT companies have stepped up to lend their technologies to fight the pandemic. …
Graphing The Coronavirus Pandemic was written by Jeffrey Burt at The Next Platform.

At Docker, we are always looking for ways to make developers’ lives easier either directly or by working with our partners. Improving developer productivity is a core benefit of using Docker products and recently one of our partners made an announcement that makes developing cloud-native apps easier.
AWS announced that its customers can now configure their Amazon Elastic Container Service (ECS) applications deployed in Amazon Elastic Compute Cloud (EC2) mode to access Amazon Elastic File Storage (EFS) file systems. This is good news for Docker developers who use Amazon ECS. It means that Amazon ECS now natively integrates with Amazon EFS to automatically mount shared file systems into Docker containers. This allows you to deploy workloads that require access to shared storage such as machine learning workloads, containerizing legacy apps, or internal DevOps workloads such as GitLab, Jenkins, or Elasticsearch.
The beauty of containerizing your applications is to provide a better way to create, package, and deploy software across different computing environments in a predictable and easy-to-manage way. Containers were originally designed to be stateless and ephemeral (temporary). A stateless application is one that neither reads nor stores information about its state from one time that it is run Continue reading
Gartner recommends all security vendors invest in cloud security posture management and forecasts...
Spending on AI is poised to jump, particularly among enterprises that are deploying the technology...
Cisco CEO Chuck Robbins said his company has the wherewithal to survive the pandemic without laying...
Today's Heavy Networking is all about wireless. Guest Bryan Ward, Lead Network Engineer at Dartmouth College, takes us through a campus-wide wireless upgrade that the institution is currently undertaking. We get nerdy about planning, infrastructure, cabling, and more, and dive into why the college is switching vendors.
The post Heavy Networking 511: A Wireless Upgrade Case Study appeared first on Packet Pushers.
SDxCentral Weekly Wrap for April 10, 2020: Vodafone cut costs by 50% with VMware's Telco Cloud;...
The move extends persistent data storage to containers running in the AWS ecosystem and targets the...

If you configure a newsreader to alert you every time someone hijacks a BGP autonomous system (AS), it will probably go off at least once a week. The most recent one was on the first of April courtesy of Rostelecom. But they’re not the only one. They’re just the latest. The incidences of people redirecting BGP, either by accident or be design, are becoming more and more frequent. And as we rely more and more on things like cloud computing and online applications to do our daily work and live our lives, the impact of these hijacks is becoming more and more critical.
BGP isn’t the oldest thing on the Internet. RFC 1105 is the initial draft of Border Gateway Protocol. The version that we use today, BGP4, is documented in RFC 4271. It’s a protocol that has enjoyed a long history of revisions and a reviled history of making networking engineers’ lives difficult. But why is that? How can a routing protocol be so critical and yet obtuse?
My friend Marko Milivojevic famously stated in his CCIE training career that, “BGP isn’t a routing protocol. It’s a policy engine.” When you look at the decisions of Continue reading
The networking assistant role is a major and important one in every business and organization. They are responsible for building, designing, implementing, and maintaining complex systems that keep employers in an organization productive. They work on computer networks that are the most critical part of every organization. They install, support, and maintain computer systems, including Intranet, Extranet, LAN (Local Area Networks), WAN (Wide Area Networks), phone system, network segments, and all other data communication systems.
When looking to hire a networking assistant for your business or organization, you need to spend time on some credible sites. Hiring a networking assistant shouldn’t stress you out, you only need to look in the right places to find the best for your business.
To connect with the right networking assistants, you need to check networking platforms where they spend time. Popular networking platforms or resources to find the best networking assistants include Cisco Support Community, Networking Forum, and AnandTech Forum. These are the top sites to find computer gurus for your business.
Start new forum threads to send recruitment messages and advertise your jobs to users on these platforms. Use the site as a resource to ask Continue reading